Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe
-
Size
272KB
-
MD5
65e4bc9f33a8b382c02d34bf69f15e9f
-
SHA1
4e16d4ba45ead14c26eb6880b32ccd43cf6d2481
-
SHA256
407e18e6787da05679a918c9ae48d6358054a7e27c62d36dde7e5a798335d48d
-
SHA512
e5435e389003dc50a829ddb099e8070506780a3a7e7909f3fc94ea5aa8ac8c8c8b2710ffbc9701726842f0738cbf773ea39e6a27b184f19d7da890b1d244fc45
-
SSDEEP
6144:zW////q5kqfDWOTQeBVlc363RR/X32SJ0zxVhZ/Jn6XZPp:zW////q5faO9PlhhR/21rhZ/JYZPp
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 16 IoCs
resource yara_rule behavioral2/memory/2444-32-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-37-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-42-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-46-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-50-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-53-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-56-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-60-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-63-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-66-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-70-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-73-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-76-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-80-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-83-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/2444-86-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\B0Z41YQFLX.exe = "C:\\Users\\Admin\\AppData\\Roaming\\B0Z41YQFLX.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\svchost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe:*:Enabled:Windows Messanger" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\B0Z41YQFLX.exe" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DCCEFEA5-E3EA-CD5D-F1B7-99DCEBDC59FC} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DCCEFEA5-E3EA-CD5D-F1B7-99DCEBDC59FC}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\B0Z41YQFLX.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{DCCEFEA5-E3EA-CD5D-F1B7-99DCEBDC59FC} svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{DCCEFEA5-E3EA-CD5D-F1B7-99DCEBDC59FC}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\B0Z41YQFLX.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe -
Executes dropped EXE 2 IoCs
pid Process 1696 URamKV.exe 2444 svchost.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\B0Z41YQFLX.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\javaw.exe" URamKV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\B0Z41YQFLX.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2776 set thread context of 2444 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 91 -
resource yara_rule behavioral2/memory/2444-25-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-31-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-32-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-37-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-42-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-46-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-50-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-53-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-56-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-60-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-63-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-66-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-70-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-73-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-76-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-80-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-83-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/2444-86-0x0000000000400000-0x000000000047B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language URamKV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1500 reg.exe 4092 reg.exe 4840 reg.exe 3608 reg.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe Token: 1 2444 svchost.exe Token: SeCreateTokenPrivilege 2444 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2444 svchost.exe Token: SeLockMemoryPrivilege 2444 svchost.exe Token: SeIncreaseQuotaPrivilege 2444 svchost.exe Token: SeMachineAccountPrivilege 2444 svchost.exe Token: SeTcbPrivilege 2444 svchost.exe Token: SeSecurityPrivilege 2444 svchost.exe Token: SeTakeOwnershipPrivilege 2444 svchost.exe Token: SeLoadDriverPrivilege 2444 svchost.exe Token: SeSystemProfilePrivilege 2444 svchost.exe Token: SeSystemtimePrivilege 2444 svchost.exe Token: SeProfSingleProcessPrivilege 2444 svchost.exe Token: SeIncBasePriorityPrivilege 2444 svchost.exe Token: SeCreatePagefilePrivilege 2444 svchost.exe Token: SeCreatePermanentPrivilege 2444 svchost.exe Token: SeBackupPrivilege 2444 svchost.exe Token: SeRestorePrivilege 2444 svchost.exe Token: SeShutdownPrivilege 2444 svchost.exe Token: SeDebugPrivilege 2444 svchost.exe Token: SeAuditPrivilege 2444 svchost.exe Token: SeSystemEnvironmentPrivilege 2444 svchost.exe Token: SeChangeNotifyPrivilege 2444 svchost.exe Token: SeRemoteShutdownPrivilege 2444 svchost.exe Token: SeUndockPrivilege 2444 svchost.exe Token: SeSyncAgentPrivilege 2444 svchost.exe Token: SeEnableDelegationPrivilege 2444 svchost.exe Token: SeManageVolumePrivilege 2444 svchost.exe Token: SeImpersonatePrivilege 2444 svchost.exe Token: SeCreateGlobalPrivilege 2444 svchost.exe Token: 31 2444 svchost.exe Token: 32 2444 svchost.exe Token: 33 2444 svchost.exe Token: 34 2444 svchost.exe Token: 35 2444 svchost.exe Token: SeDebugPrivilege 2444 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2776 wrote to memory of 1980 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 84 PID 2776 wrote to memory of 1980 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 84 PID 2776 wrote to memory of 1980 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 84 PID 1980 wrote to memory of 4628 1980 csc.exe 88 PID 1980 wrote to memory of 4628 1980 csc.exe 88 PID 1980 wrote to memory of 4628 1980 csc.exe 88 PID 2776 wrote to memory of 1696 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 90 PID 2776 wrote to memory of 1696 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 90 PID 2776 wrote to memory of 1696 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 90 PID 2776 wrote to memory of 2444 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 91 PID 2776 wrote to memory of 2444 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 91 PID 2776 wrote to memory of 2444 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 91 PID 2776 wrote to memory of 2444 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 91 PID 2776 wrote to memory of 2444 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 91 PID 2776 wrote to memory of 2444 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 91 PID 2776 wrote to memory of 2444 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 91 PID 2776 wrote to memory of 2444 2776 JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe 91 PID 2444 wrote to memory of 1176 2444 svchost.exe 92 PID 2444 wrote to memory of 1176 2444 svchost.exe 92 PID 2444 wrote to memory of 1176 2444 svchost.exe 92 PID 2444 wrote to memory of 640 2444 svchost.exe 93 PID 2444 wrote to memory of 640 2444 svchost.exe 93 PID 2444 wrote to memory of 640 2444 svchost.exe 93 PID 2444 wrote to memory of 2588 2444 svchost.exe 94 PID 2444 wrote to memory of 2588 2444 svchost.exe 94 PID 2444 wrote to memory of 2588 2444 svchost.exe 94 PID 2444 wrote to memory of 2548 2444 svchost.exe 95 PID 2444 wrote to memory of 2548 2444 svchost.exe 95 PID 2444 wrote to memory of 2548 2444 svchost.exe 95 PID 2588 wrote to memory of 1500 2588 cmd.exe 100 PID 2588 wrote to memory of 1500 2588 cmd.exe 100 PID 2588 wrote to memory of 1500 2588 cmd.exe 100 PID 1176 wrote to memory of 4092 1176 cmd.exe 101 PID 1176 wrote to memory of 4092 1176 cmd.exe 101 PID 1176 wrote to memory of 4092 1176 cmd.exe 101 PID 2548 wrote to memory of 4840 2548 cmd.exe 102 PID 2548 wrote to memory of 4840 2548 cmd.exe 102 PID 2548 wrote to memory of 4840 2548 cmd.exe 102 PID 640 wrote to memory of 3608 640 cmd.exe 103 PID 640 wrote to memory of 3608 640 cmd.exe 103 PID 640 wrote to memory of 3608 640 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_65e4bc9f33a8b382c02d34bf69f15e9f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xy8-ebbt.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8CFF.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8CFE.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:4628
-
-
-
C:\Users\Admin\AppData\Local\Temp\URamKV.exe"C:\Users\Admin\AppData\Local\Temp\URamKV.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4092
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\svchost.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3608
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\B0Z41YQFLX.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\B0Z41YQFLX.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\B0Z41YQFLX.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\B0Z41YQFLX.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4840
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c78cb1c06b25ee869839f12e8a9f8a04
SHA1e2fb7e6ffa5d1d8ad717262bbd07931818679434
SHA25669c763d96ada3ad09704be6a3964a89d8d2bdd5d9b01a5fa486540a1e3e8a912
SHA5121dc82ce84f63e1cbcccd2ff4e4418e6030c7188e46117a810f91454b9be8a7fa08e36e589bba5012c40e0274026cec8859da36a07096ecaa7c2985b2a82fe3aa
-
Filesize
4KB
MD5875c8a5378f1f314dd11fd8dc45d4cd9
SHA1b93597b2e2996ee915cdf461dfc6591326f1de9d
SHA2560cb43ddf86500d5af51c14a70ab9cc7f8e7a1480e9859dc70756cd06e9fdc8b9
SHA512346f0194826cb6f6a124b061b6ce5e95f4472da2b50dd1504fbda01ff41dd95ee412fb615ca96afc3cf722443f740af6683dfc307f2d3f334f3cb71e4d1964a6
-
Filesize
34KB
MD5e118330b4629b12368d91b9df6488be0
SHA1ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA2563a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0
-
Filesize
644B
MD5b6085519974d5a1c1f789d34b718db3e
SHA1000ca4f23a10d87ca708e4f1054c69635779e8b3
SHA2566210dc15b6a0da72c83fc5b532106bd807f84f631776657e7337f74654719953
SHA51235145a8122ecbded61637b4d40c27000413a788d9ce55e0c5bf2f4d38cbc961e7f4f89b4a6b8a76e50abf2a97bc6813986f13f50fcaf30580e12eef8bca7595d
-
Filesize
1KB
MD53454a6e858e7358492a86a523bf7fd7e
SHA174c90ca50f25680fd7332c496306f865023aea4d
SHA256f0729c2e0620f65fc29c14faa25c9ed8c3d035ec180fcc191311597f310b5a0a
SHA5124b475ced5e20c89eade83bb7c2cbe7564cf90c4378feee546a565649a5ec8e3e5c52af0fabc5d64ea212a9cc7d74c4823a801e1ec91c28508867d69be04a9afd
-
Filesize
259B
MD5ea073b14e9f84c2b89a1adb64b5db3ba
SHA19676912452f4ab6445303c41401dcb4778e131de
SHA256006fc200719f4acaa4b44363700e34bae194593b7448f80afb9601732e8bd58c
SHA512b89738a3ad20c506aed5cc37fc395e159310d3902e1d41bf749e413a0f877db6333166d2a0012839372b84de99fd274f993daeb5c4415ed63607f8c0cb3ec861